General

  • Target

    2024-05-05_08783c9b148ea4391f83209e72ec2f53_cryptolocker

  • Size

    96KB

  • MD5

    08783c9b148ea4391f83209e72ec2f53

  • SHA1

    8862700e0a0acd354833367d9494558c2fc5b1bb

  • SHA256

    499e787baaf3c96e0f55ae62809b5319045fd4826055d599344a7494ecc74b39

  • SHA512

    e9077b575b7a9e5b3b64f4c1c2f31c6a1745264bc428e0d904a01c22403a781435891c7eaf13188b962d86a2dc92835ec7a986d8aa53c70cb744cce39d4525aa

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqF:zCsanOtEvwDpjBA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-05_08783c9b148ea4391f83209e72ec2f53_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections